Shopping Cart

No products in the cart.

BS EN IEC 60839-11-5:2020

$215.11

Alarm and electronic security systems – Electronic access control systems. Open Supervised Device Protocol (OSDP)

Published By Publication Date Number of Pages
BSI 2020 92
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

IEC 60839-11-5:2020 specifies the Open supervised device protocol (OSDP) for electronic access control systems. This includes communication settings, commands and replies between the ACU and the peripheral devices. It also includes a mapping of mandatory and optional requirements as per IEC 60839-11-1:2013 as covered by Annex. This document applies to physical security only. Physical security prevents unauthorized personnel, attackers or accidental intruders from physically accessing a building, room, etc.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA(normative)Normative references to international publicationswith their corresponding European publications
7 CONTENTS
13 FOREWORD
15 INTRODUCTION
16 1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
17 3.2 Abbreviated terms
4 Overview
Figures
Figure 1 – Schematic overview of an OSDP connection
18 5 Communication settings
5.1 Physical interface
5.2 Signaling
5.3 Character encoding
5.4 Channel access
5.5 Multi-byte data encoding
19 5.6 Packet size limits
5.7 Timing
5.8 Message synchronization
20 5.9 Packet format
Tables
Table 1 – Packet format
21 Table 2 – Message control information
22 5.10 Multi-part messages
5.10.1 General
5.10.2 Multi-part message usage rules
Table 3 – The security block (SB)
Table 4 – Multi-part message structure
23 5.11 Smartcard handling
Table 5 – Behaviour modes
24 6 Commands
6.1 General
6.2 Poll request (osdp_POLL)
6.3 ID report request (osdp_ID)
Table 6 – Poll request
25 6.4 Peripheral device capabilities request (osdp_CAP)
6.5 Local status report request (osdp_LSTAT)
6.6 Input status report request (osdp_ISTAT)
Table 7 – ID report request
Table 8 – Peripheral device capabilities request
Table 9 – Local status report request
Table 10 – Input status report request
26 6.7 Output status report request (osdp_OSTAT)
6.8 Reader status report request (osdp_RSTAT)
6.9 Output control command (osdp_OUT)
Table 11 – Output status report request
Table 12 – Reader status report request
27 6.10 Reader LED control command (osdp_LED)
Table 13 – Output control command
Table 14 – Control code values
28 Table 15 – Reader LED control command
29 6.11 Reader buzzer control command (osdp_BUZ)
Table 16 – Temporary control code values
Table 17 – Permanent control code values
Table 18 – Color values
30 6.12 Reader text output command (osdp_TEXT)
Table 19 – Reader buzzer control command (osdp_BUZ)
31 6.13 Communication configuration command (osdp_COMSET)
Table 20 – Reader text output command (osdp_TEXT)
Table 21 – Text command values
32 6.14 Scan and send biometric data (osdp_BIOREAD)
Table 22 – Communication configuration command (osdp_COMSET)
Table 23 – Scan and send biometric data (osdp_BIOREAD)
33 6.15 Scan and match biometric template (osdp_BIOMATCH)
Table 24 – Biometric types
Table 25 – Fingerprint formats
34 6.16 Encryption key set (osdp_KEYSET)
6.17 Challenge and secure session initialization request (osdp_CHLNG)
6.18 Server’s random number and server cryptogram (osdp_SCRYPT)
6.19 Manufacturer specific command (osdp_MFG)
Table 26 – Command structure: 6-byte header followed by a variable length template
35 6.20 ACU receive size (osdp_ACURXSIZE)
6.21 Keep reader active (osdp_KEEPACTIVE)
Table 27 – Manufacturer specific commands (osdp_MFG)
Table 28 – ACU receive size (osdp_ACURXSIZE)
Table 29 – Keep reader active (osdp_KEEPACTIVE)
36 6.22 Abort current operation (osdp_ABORT)
6.23 Get PIV data (osdp_PIVDATA)
6.24 General authenticate (osdp_GENAUTH)
Table 30 – Abort current operation (osdp_ABORT)
Table 31 – Get PIV data (osdp_PIVDATA)
37 6.25 Authentication challenge (osdp_CRAUTH)
Table 32 – General authenticate (osdp_GENAUTH) fragment
Table 33 – Authentication challenge (osdp_CRAUTH) fragment
38 6.26 File transfer command (osdp_FILETRANSFER)
6.27 Extended write data (osdp_XWR)
6.27.1 General
Table 34 – File transfer command
39 6.27.2 Mode set command
Table 35 – Extended write command structure
Table 36 – Mode set command
Table 37 – Mode 0 configuration
Table 38 – Mode 1 configuration
40 6.27.3 Mode-00 read setting
6.27.4 Mode specific command codes for XRW_MODE=1
6.27.5 Mode-01 transparent content send request
6.27.6 Mode-01 connection done
Table 39 – Read setting request
Table 40 – Mode specific command codes
Table 41 – Transparent content send request
41 6.27.7 Mode-01 request secure PIN entry command
Table 42 – Smartcard connection done
Table 43 – Request secure PIN entry command
42 6.27.8 Mode-01 smartcard scan
7 Replies
7.1 General
Table 44 – Smartcard scan
43 7.2 General acknowledge – Nothing to report (osdp_ACK)
7.3 Negative acknowledge – Error response (osdp_NAK)
Table 45 – General acknowledge (osdp_ACK)
Table 46 – Negative acknowledge (osdp_NAK)
44 7.4 Device identification report (osdp_PDID)
Table 47 – Error codes
45 7.5 Device capabilities report (osdp_PDCAP)
Table 48 – Device identification report (osdp_PDID)
Table 49 – Device capabilities report (osdp_PDCAP)
46 7.6 Local status report (osdp_LSTATR)
7.7 Input status report (osdp_ISTATR)
7.8 Output status report (osdp_OSTATR)
Table 50 – Local status report (osdp_LSTATR)
Table 51 – Input status report (osdp_ISTATR)
47 7.9 Reader tamper status report (osdp_RSTATR)
7.10 Card data report, raw bit array (osdp_RAW)
Table 52 – Output status report (osdp_OSTATR)
Table 53 – Reader tamper status report (osdp_RSTATR)
48 7.11 Card data report, character array (osdp_FMT)
7.12 Keypad data report (osdp_KEYPAD)
Table 54 – Card data report, raw bit array (osdp_RAW)
Table 55 – Card data report, character array (osdp_FMT)
49 7.13 Communication configuration report (osdp_COM)
7.14 Scan and send biometric data (osdp_BIOREADR)
Table 56 – Keypad data report (osdp_KEYPAD)
Table 57 – Communication configuration report (osdp_COM)
50 7.15 Scan and match biometric template (osdp_BIOMATCHR)
7.16 Client’s ID and client’s random number (osdp_CCRYPT)
Table 58 – Scan and send biometric data (osdp_BIOREADR)
Table 59 – Scan and match biometric template (osdp_BIOMATCHR)
51 7.17 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I)
7.18 Manufacturer specific reply (osdp_MFGREP)
7.19 PD busy reply (osdp_BUSY)
7.20 PIV data reply (osdp_PIVDATAR)
Table 60 – Manufacturer specific reply (osdp_MFGREP)
Table 61 – PD busy reply (osdp_BUSY)
52 7.21 osdp_GENAUTHR
7.22 Response to challenge (osdp_CRAUTHR)
Table 62 – PIV data reply (osdp_PIVDATAR)
Table 63 – General authenticate response (osdp_GENAUTHR)
53 7.23 Manufacturer specific status reply (osdp_MFGSTATR)
7.24 Manufacturer specific error reply (osdp_MFGERRR)
7.25 File transfer status (osdp_FTSTAT)
Table 64 – Response to challenge (osdp_CRAUTHR)
Table 65 – Manufacturer specific status reply (osdp_MFGSTATR)
Table 66 – Manufacturer specific error reply (osdp_MFGERRR)
54 7.26 Extended read reply (osdp_XRD)
7.26.1 General
Table 67 – File transfer status (osdp_FTSTAT)
55 7.26.2 Mode specific reply codes for XRW_MODE=0
7.26.3 Mode-00 error reply (osdp_PR00ERROR)
7.26.4 Mode setting report (osdp_PR00REQR)
Table 68 – Extended read reply
Table 69 – Mode specific reply codes
Table 70 – Error reply
56 7.26.5 Card information report (osdp_PR00CIRR)
7.26.6 Mode specific reply codes for XRW_MODE=1
Table 71 – Mode setting report
Table 72 – Card information report
Table 73 – Mode specific reply codes
57 7.26.7 Mode-01 NAK or error reply (osdp_PR01ERROR)
7.26.8 Card present notification reply (osdp_PR01PRES)
7.26.9 Transparent card data reply (osdp_PR01SCREP)
Table 74 – Error reply
Table 75 – Card present notification reply
Table 76 – Transparent card data reply
58 7.26.10 Secure PIN entry complete reply (osdp_PR01SPER)
Table 77 – Transparent card data reply
59 Annex A (normative)Command and reply code numbers commands
A.1 Commands
Table A.1 – Commands code numbers
60 A.2 Replies
Table A.2 – Replies code numbers
61 Annex B (normative)Function code definitions list
B.1 General
B.2 Function code 1 – Contact status monitoring
Table B.1 – Function codes
62 B.3 Function code 2 – Output control
B.4 Function code 3 – Card data format
B.5 Function code 4 – Reader LED control
63 B.6 Function code 5 – Reader audible output
B.7 Function code 6 – Reader text output
B.8 Function code 7 – Time keeping
B.9 Function code 8 – Check character support
64 B.10 Function code 9 – Communication security
B.11 Function code 10 – Receive bufferSize
B.12 Function code 11 – Largest combined message size
B.13 Function code 12 – Smart card support
65 B.14 Function code 13 – Readers
B.15 Function code 14 – Biometrics
B.16 Function code 15 – Secure PIN entry support
B.17 Function code 16 – OSDP version
66 Annex C (normative)CRC definition
69 Annex D (normative)Encryption
D.1 Encryption method: OSDP-SC
D.1.1 General
Table D.1 – SEC_BLK_TYPE assignment
70 D.1.2 Overview
D.1.3 The process
D.1.4 Secure channel session connection sequence (SCS-CS)
72 D.1.5 Communication during a secure channel session
D.1.6 SCS_16 PD->ACU
D.1.7 SCS_17 ACU->PD
D.1.8 SCS_18 PD->ACU
D.2 Commands
D.2.1 Encryption key set (osdp_KEYSET)
Table D.2 – Command structure: 2-byte header followed by variable length data
73 D.2.2 Challenge and secure session initialization request (osdp_CHLNG)
D.2.3 Server’s random number and server cryptogram (osdp_SCRYPT)
D.3 Replies
D.3.1 Client’s ID and client’s random number (osdp_CCRYPT)
Table D.3 – Command structure: 8-byte random number as the “challenge”
Table D.4 – Command structure: 16-byte server cryptogram
74 D.3.2 Client cryptogram packet and the initial R-MAC (osdp_RMAC_I)
D.4 Algorithms and support functions
D.4.1 Session key derivation
D.4.2 Key diversification
Table D.5 – Command structure: 32-byte structure
Table D.6 – Command structure: 16-byte structure
75 D.4.3 Client cryptogram
D.4.4 Server cryptogram
D.4.5 Padding
D.5 Message authentication code (MAC) generation
D.5.1 General
76 D.5.2 The wrap operation for security block types SCS_15, SCS-16, SCS_17, and SCS_18
Figure D.1 – MAC algorithm
77 D.5.3 The unwrap operation
D.6 Error recovery
D.7 Field deployment and configuration
79 Annex E (normative)Test vectors
80 Annex F (informative)Mapping of mandatory functions in IEC 60839-11-1
81 Table F.1 – Access point interface requirements
82 Table F.2 – Indication and annunciation requirements
85 Table F.3 – Recognition requirements
86 Table F.4 – Duress signalling requirements
Table F.5 – Overriding requirements
87 Table F.6 – System self-protection requirements (1 of 3)
90 Bibliography
BS EN IEC 60839-11-5:2020
$215.11